- Description
- A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.
- Source
- psirt@paloaltonetworks.com
- NVD status
- Analyzed
- Products
- pan-os
CVSS 3.1
- Type
- Primary
- Base score
- 10
- Impact score
- 6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
- Severity
- CRITICAL
Data from CISA
- Vulnerability name
- Palo Alto Networks PAN-OS Command Injection Vulnerability
- Exploit added on
- Apr 12, 2024
- Exploit action due
- Apr 19, 2024
- Required action
- Apply mitigations per vendor instructions as they become available. Otherwise, users with vulnerable versions of affected devices should enable Threat Prevention IDs available from the vendor. See the vendor bulletin for more details and a patch release schedule.
- Hype score
- Not currently trending
Actively exploited CVE : CVE-2024-3400
@transilienceai
22 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
🚨 Zero-Day in the Wild: Inside the PAN-#OS GlobalProtect Critical Command Injection (#CVE-2024-3400) https://t.co/eCFQe6sTqn Educational Purposes!
@UndercodeUpdate
5 Mar 2026
28 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Zero-Day Alert: Palo Alto CVE-2024-3400 (CVSS 10.0). Critical pre-auth RCE in GlobalProtect. Actively exploited. Attackers inject commands via HTTP requests to gain root. Patch immediately. Scan for exposed PAN-OS. https://t.co/eXmzbav3yy
@computerauditor
24 Feb 2026
96 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Heads up! Palo Alto CVE-2024-3400 is a perfect 10.0 RCE. Unauth attackers own PAN-OS GlobalProtect by injecting commands. If you're finding these unpatched, it's a critical bounty. Patch or hunt. https://t.co/iHN151wsSW
@computerauditor
17 Feb 2026
63 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
تم رصد ثغرة يوم صفر في PAN-OS لدى Palo Alto Networks (CVE-2024-3400). تُمكّن من تنفيذ أوامر عن بُعد؛ وأدرجتها CISA في قائمة KEV مع مهلة إلزامية للتصحيح. #الأمن_السيبراني #ثغرات_يو
@fyntralink
16 Feb 2026
42 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Cytellite recent detection targeting CVE-2024-3400 — FOP Dmytro Nedilskyi Visit -- https://t.co/K4osjZ8kht #Loginsoft #Cytellite #Cybersecurity #CVE20243400 #LOVI #ThreatIntelligence #Infosecurity #AI https://t.co/U4yjXGLAaP
@Loginsoft_Intel
2 Jan 2026
33 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 The PAN-#OS Pandemic: How #CVE-2024-3400 Turns Your Firewall Into a Cybercriminal's Playground https://t.co/InDMBKGFFR Educational Purposes!
@UndercodeUpdate
30 Nov 2025
36 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Plugin update: PaloAltoPlugin (CVE-2024-3400, CVE-2025-0133). PaloAlto PAN-OS XSS vulnerability detection added - GlobalProtect portal affected. Results: https://t.co/Iez2FOPZeB https://t.co/pO5FoKMDqJ
@leak_ix
19 Nov 2025
331 Impressions
0 Retweets
0 Likes
1 Bookmark
0 Replies
0 Quotes
Últimas noticias sobre #Hacking: En las últimas 24 horas, se destacaron tensiones regulatorias en comercio digital por bloqueos a LaLiga, ataques de ciberespionaje chinos a ONGs en EE.UU., explotación de la vulnerabilidad CVE-2024-3400 para minería... 👉 https://t.co/CAPEW
@JaimeARestrepo_
9 Nov 2025
117 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🔥 PAN-OS GlobalProtect sigue vulnerable CVE-2024-3400 (CVSS 10.0) permite control total sin autenticación. Hay parches y firmas, pero miles de firewalls siguen expuestos. ¿Ya actualizaste? #Ciberseguridad #PaloAlto #PANOS #GlobalProtect #infosec https://t.co/YetYxMw7ck
@trustlock_sec
8 Oct 2025
8 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Surge in attacks targeting Palo Alto Networks' PAN-OS devices, exploiting vulnerabilities like CVE-2024-3400. Company urges immediate patching. Source: TechRadar #Cybersecurity
@WhatsNext_Tech
7 Oct 2025
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Ransomware surges, Russian hybrid warfare drones, major leaks, and AI-powered scams dominate cyber headlines this hour 🚨 🛡️ Massive exploitation of critical PAN-OS GlobalProtect flaw (CVE-2024-3400, CVSS 10.0) allowing root remote code execution on Palo Alto firewalls is
@np_cyber_news
3 Oct 2025
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️ Weekly vuln radar from https://t.co/8RzyA4nEyg: CVE-2024-3400 (@stevenadair) CVE-2025-24132 CVE-2025-43300 CVE-2025-5777 CVE-2025-55177 CVE-2023-34044 (@pr0Ln) CVE-2023-20870 CVE-2025-10035 CVE-2025-20333 https://t.co/Z18UZ0WhOF
@ptdbugs
3 Oct 2025
2 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ Increase in Scans for Palo Alto Global Protect Vulnerability (CVE-2024-3400), (Mon, Sep 29th) (SANS Internet Storm Center) ❓ How can you best mitigate risks from the CVE-2024-3400 vulnerability in Palo Alto's Global Protect software? Learn more at dilag3nt[.]com
@Dilag3nt
2 Oct 2025
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ Increase in Scans for Palo Alto Global Protect Vulnerability (CVE-2024-3400), (Mon, Sep 29th) (SANS Internet Storm Center) ❓ What is the primary threat associated with CVE-2024-3400 in Palo Alto Networks' Global Protect? Learn more at dilag3nt[.]com
@Dilag3nt
2 Oct 2025
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Hackers Actively Scanning to Exploit Palo Alto Networks PAN-OS Global Protect Vulnerability Read more: https://t.co/VtsR7zsUQK… A significant increase in internet-wide scans targeting the critical PAN-OS GlobalProtect vulnerability (CVE-2024-3400). Exploit attempts hav
@sirjameshackz
2 Oct 2025
69 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
https://t.co/vWwhHpc0gB Increase in Scans for Palo Alto Global Protect Vulnerability (CVE-2024-3400)
@samilaiho
1 Oct 2025
422 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Hackers Actively Scanning to Exploit Palo Alto Networks PAN-OS Global Protect Vulnerability Read more: https://t.co/ZYXvYxP5G1 A significant increase in internet-wide scans targeting the critical PAN-OS GlobalProtect vulnerability (CVE-2024-3400). Exploit attempts have h
@The_Cyber_News
1 Oct 2025
14552 Impressions
89 Retweets
236 Likes
75 Bookmarks
3 Replies
3 Quotes
CRITICAL ALERT! A Zero-Day RCE Exploit Wave is actively hitting Palo Alto Networks GlobalProtect (CVE-2024-3400). Attackers are moving fast. If you run GlobalProtect, your network perimeter is compromised. Read the full report on - https://t.co/8y07evICHd https://t.co/IxaNRwIaBv
@cyberbivash
1 Oct 2025
2 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Explotación activa de vulnerabilidad crítica en PAN-OS GlobalProtect (CVE-2024-3400) Mas información: https://t.co/8t28bWgELL https://t.co/OJBwsTq0a3
@CSIRT_Telconet
30 Sept 2025
115 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
IMMEDIATE SHUTDOWN! The critical Palo Alto PAN-OS Flaw (CVE-2024-3400) is under ACTIVE EXPLOITATION. We break down the threat and provide the mandatory Mitigation Steps required to stop the breach. Read the full report on - https://t.co/7sZC2vEs9d https://t.co/kexMmoWI5S
@cyberbivash
29 Sept 2025
3 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Increase in Scans for Palo Alto Global Protect Vulnerability (CVE-2024-3400), (Mon, Sep 29th) https://t.co/ajII9C0fWF #SANS #Cybersecurity https://t.co/fFWUqp1Nm3
@PoseidonTPA
29 Sept 2025
19 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Increase in Scans for Palo Alto Global Protect Vulnerability (CVE-2024-3400) https://t.co/FOnjZu31LP https://t.co/rPoHn2AbdM
@sans_isc
29 Sept 2025
1400 Impressions
0 Retweets
3 Likes
2 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2024-3400
@transilienceai
29 Sept 2025
11 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2024-3400
@transilienceai
28 Sept 2025
6 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2024-3400
@transilienceai
26 Sept 2025
3 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2024-3400
@transilienceai
25 Sept 2025
5 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2024-3400
@transilienceai
24 Sept 2025
8 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2024-3400
@transilienceai
23 Sept 2025
5 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2024-3400
@transilienceai
19 Sept 2025
17 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Salt Typhoon hid inside U.S. Army National Guard networks for 9 months. No malware. No alerts. Just broken fundamentals. Here are 5 urgent lessons every organization must act on to avoid being next👇 1️⃣ Don’t wait for 0-days. Patch known CVEs CVE-2024-3400 and CVE-20
@HunterStrategy
15 Sept 2025
89 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
CVE-2024-3400 Palo Alto Networks PAN-OS命令注入漏洞 5月12日的是看到 paloaltonetworks 有一个安全公告[1], CVE编号是 CVE-2024-3400, 漏洞是一个命令注入,影响的版本 技术联系:https://t.co/9tTNUWam4h https://t.co/rxy44TfeUB
@TTUinnn1
11 Sept 2025
4120 Impressions
0 Retweets
53 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-3400 Palo Alto Networks PAN-OS命令注入漏洞 5月12日的是看到 paloaltonetworks 有一个安全公告[1], CVE编号是 CVE-2024-3400, 漏洞是一个命令注入,影响的版本 https://t.co/HmWGk77OHd https://t.co/KV4ORFludU
@Gerva555
1 Sept 2025
2224 Impressions
0 Retweets
33 Likes
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2024-3400
@transilienceai
27 Jul 2025
68 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2024-3400
@transilienceai
8 May 2025
6 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2024-3400
@transilienceai
7 May 2025
7 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2024-3400
@transilienceai
6 May 2025
6 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2024-3400
@transilienceai
5 May 2025
3 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2024-3400
@transilienceai
4 May 2025
8 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2024-3400
@transilienceai
30 Apr 2025
8 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2024-3400
@transilienceai
28 Apr 2025
6 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2024-3400
@transilienceai
27 Apr 2025
9 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2024-3400
@transilienceai
26 Apr 2025
22 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2024-3400
@transilienceai
26 Apr 2025
26 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2024-3400
@transilienceai
25 Apr 2025
15 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2024-3400
@transilienceai
25 Apr 2025
30 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2024-3400
@transilienceai
23 Apr 2025
19 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
+24,000 IPs Target PAN-OS Global Protect Gateways Researchers have observed nearly 24,000 IP addresses probing for vulnerable Palo Alto Networks PAN-OS devices following disclosure of a zero-day (CVE-2024-3400). The flaw allows unauthenticated command execution via the
@WarrenTevora
7 Apr 2025
24 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Researchers have observed nearly 24,000 IP addresses probing for vulnerable Palo Alto Networks PAN-OS devices following disclosure of a zero-day (CVE-2024-3400). The flaw allows unauthenticated command execution via the GlobalProtect portal, potentially exposing internal systems.
@WarrenTevora
7 Apr 2025
2 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Mass scanning alert: 24,000+ IPs targeting Palo Alto GlobalProtect (PAN-OS) VPNs in coordinated login attempts. Likely probing for CVE-2024-3400 exploits. Defenders: check auth logs NOW. Details: https://t.co/eiRJ8LSpVB #CyberSecurity #ThreatIntel
@adriananglin
1 Apr 2025
15 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:-:*:*:*:*:*:*",
"matchCriteriaId": "F54B40AC-A555-4447-B147-576D17CAB12A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:h1:*:*:*:*:*:*",
"matchCriteriaId": "BEC5E9D4-1B58-4C89-8B68-47F996C04234",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:h2:*:*:*:*:*:*",
"matchCriteriaId": "DDDEB31F-EFDD-4A66-9687-7FFCF8EFDAAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:-:*:*:*:*:*:*",
"matchCriteriaId": "0F30A71D-281E-4BF8-803F-05B517399C6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:h1:*:*:*:*:*:*",
"matchCriteriaId": "5CB7F608-4F03-46EF-A27E-4C8F5363FF5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:-:*:*:*:*:*:*",
"matchCriteriaId": "33340036-0E81-41CD-AFC4-480F509F8DD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h1:*:*:*:*:*:*",
"matchCriteriaId": "5D7986DC-187D-4798-8B4A-7D23DF0EE0C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h2:*:*:*:*:*:*",
"matchCriteriaId": "9D1FAC78-7714-48EC-9FDB-1A565814B958",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h4:*:*:*:*:*:*",
"matchCriteriaId": "4B86668F-7BC5-4F50-AE80-E99F6DE370D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:-:*:*:*:*:*:*",
"matchCriteriaId": "98F219AD-A22F-47AC-88FE-B3F75AE059AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h11:*:*:*:*:*:*",
"matchCriteriaId": "A79C13FD-C909-4FEE-AE24-A085E953D887",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h12:*:*:*:*:*:*",
"matchCriteriaId": "A7FCFB45-1150-4F9C-8E4B-3DB2ADE89454",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h2:*:*:*:*:*:*",
"matchCriteriaId": "50F0801B-FC9F-4018-A837-CAB8CB9C9CD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h4:*:*:*:*:*:*",
"matchCriteriaId": "C8C4AC1F-4FF0-4500-AFBB-F29613358156",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h9:*:*:*:*:*:*",
"matchCriteriaId": "6FE16CA7-422A-4A53-8DDC-CB3A982C154F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:-:*:*:*:*:*:*",
"matchCriteriaId": "135588B5-6771-46A3-98B0-39B4873FD6FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h10:*:*:*:*:*:*",
"matchCriteriaId": "6ADF2A5B-DC55-44B1-A033-4A29C32AB5B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h2:*:*:*:*:*:*",
"matchCriteriaId": "20673F1E-733D-41C4-A644-C482431C26EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h3:*:*:*:*:*:*",
"matchCriteriaId": "156DA55E-4152-47BF-A067-136EEC9ADE22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h4:*:*:*:*:*:*",
"matchCriteriaId": "C2D2F5C4-7ACC-4514-ADBD-3948158B93CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:-:*:*:*:*:*:*",
"matchCriteriaId": "AEE36B5C-262E-42B0-B3C1-5EAA003E84B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h1:*:*:*:*:*:*",
"matchCriteriaId": "619AD3DA-9384-4CC5-9F3D-66DB5A055BCB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h4:*:*:*:*:*:*",
"matchCriteriaId": "1360C403-BCD8-420E-B907-4127E12B3A3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:-:*:*:*:*:*:*",
"matchCriteriaId": "B3AF86BD-C317-45C7-96B6-34BD82579FDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:h1:*:*:*:*:*:*",
"matchCriteriaId": "09F61A78-1B7C-41F1-A0D8-0AB1E7ADF68C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:-:*:*:*:*:*:*",
"matchCriteriaId": "A8C42D98-CF8F-456B-9D57-80BBDC2C8E74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h1:*:*:*:*:*:*",
"matchCriteriaId": "B3AAD4BA-22DD-43D3-91F1-8A6F5FBBF029",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h3:*:*:*:*:*:*",
"matchCriteriaId": "776E06EC-2FDA-4664-AB43-9F6BE9B897CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h6:*:*:*:*:*:*",
"matchCriteriaId": "CBE09375-A863-42FF-813F-C20679D7C45C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:-:*:*:*:*:*:*",
"matchCriteriaId": "5D64390F-F870-4DBF-B0FE-BCDFE58C8685",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:-:*:*:*:*:*:*",
"matchCriteriaId": "D814F3A3-5E9D-426D-A654-1346D9ECE9B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:-:*:*:*:*:*:*",
"matchCriteriaId": "8BB72E15-486F-491F-A08D-E1AC2C8AB121",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:h1:*:*:*:*:*:*",
"matchCriteriaId": "B5E7EFD5-2179-45BF-BF5B-197B66903D9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:h2:*:*:*:*:*:*",
"matchCriteriaId": "3EF4AE4F-36F3-4923-AE1E-DE9E036D4E2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:-:*:*:*:*:*:*",
"matchCriteriaId": "10A69DAE-5AD5-4E1C-9DF0-C7B7BB023B66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:h2:*:*:*:*:*:*",
"matchCriteriaId": "DFAA23E0-232D-42AA-A5A9-87063348D0DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:h3:*:*:*:*:*:*",
"matchCriteriaId": "50EA3EAC-91BD-4B30-A885-BED95B48CC3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:-:*:*:*:*:*:*",
"matchCriteriaId": "C25AD9EA-7DDC-4704-9D7C-A1D6C1F5F696",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:h1:*:*:*:*:*:*",
"matchCriteriaId": "2416C2EF-1085-493D-84D7-18F7577D4A01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:h2:*:*:*:*:*:*",
"matchCriteriaId": "5E1D99D8-300C-4985-835C-3EBA2BFC098B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:h3:*:*:*:*:*:*",
"matchCriteriaId": "8B689FAD-0469-4222-A7EF-3268CCDA43A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:-:*:*:*:*:*:*",
"matchCriteriaId": "D27A5944-FCD8-44AB-9986-0FCA24E81F5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h1:*:*:*:*:*:*",
"matchCriteriaId": "B4425F47-446D-49C1-AAC9-5F5B7E5422A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h3:*:*:*:*:*:*",
"matchCriteriaId": "A0ED8E63-B8F0-482A-A8A9-13C21D60EEB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h5:*:*:*:*:*:*",
"matchCriteriaId": "9110DBFB-07D6-4D64-A8AA-C0E7A7037A87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:-:*:*:*:*:*:*",
"matchCriteriaId": "723956E9-11FD-42A0-8A35-C1FDE9E1877C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:-:*:*:*:*:*:*",
"matchCriteriaId": "82FBA0C5-1385-42DD-A85D-DA1D818D0EF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:h1:*:*:*:*:*:*",
"matchCriteriaId": "6FAC22EB-FB4C-4E9D-99A1-D4902262ED06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:h2:*:*:*:*:*:*",
"matchCriteriaId": "B3D65F1C-B055-408E-B7F2-512F13BEDCA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.1.1:-:*:*:*:*:*:*",
"matchCriteriaId": "2DC41D6E-8632-44BB-BC05-7C22A02306A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:-:*:*:*:*:*:*",
"matchCriteriaId": "5F7627B3-A463-4570-BA23-663FEB7B4A8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h1:*:*:*:*:*:*",
"matchCriteriaId": "275872C1-1EBB-4447-8C9F-347F757BFF42",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]